Experiencing MIS 9th by m kronenke chapter 09 Experiencing MIS 9th by m kronenke chapter 09 Experiencing MIS 9th by m kronenke chapter 09 Experiencing MIS 9th by m kronenke chapter 09 Experiencing MIS 9th by m kronenke chapter 09 Experiencing MIS 9th by m kronenke chapter 09 Experiencing MIS 9th by m kronenke chapter 09
Trang 1Business Intelligence Systems
Chapter 9
Trang 2“Data Analysis, Where You Don’t Know the Second Question to Ask Until You See the Answer to the First One.”
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
• Tracking race competitors from each of event, and having unbelievable success selling products to them
• Want to match competitors to personal trainers in same locale.
• Earn referral fee.
• How to track them? Mailing address? IP address?
• Got data and Excel to start.
• Serious data mining needs a data mart.
Trang 3Study Questions
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
Q1: How do organizations use business intelligence (BI) systems?
Q2: What are the three primary activities in the BI process?
Q3: How do organizations use data warehouses and data marts to acquire data?
Q4: How do organizations use reporting applications?
Q5: How do organizations use data mining applications?
Q6: How do organizations use BigData applications?
Q7: What is the role of knowledge management systems?
Q8: What are the alternatives for publishing BI?
Q9: 2026?
Trang 5How Do Organizations Use BI?
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
Trang 6What Are Typical Uses for BI?
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
• Identifying changes in purchasing patterns
– Important life events change what customers buy
• Entertainment
– Netflix has data on watching, listening, and rental habits.
– Classify customers by viewing patterns
• Predictive policing
– Analyze data on past crimes - location, date, time, day of week, type of crime, and related data
Trang 7Just-in-Time Medical Reporting
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
• Example of real time data mining and reporting.
• Injection notification services
– Software analyzes patient’s records, if injections needed, recommends as exam progresses.
• Blurry edge of medical ethics.
Trang 8Q2: What Are the Three Primary Activities in the BI Process?
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
Trang 9Using Business Intelligence to Find Candidate Parts at Falcon Security
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
• Identify parts that might qualify.
– Provided by vendors who make part design files available for sale.
– Purchased by larger customers.
– Frequently ordered parts.
– Ordered in small quantities
• Used part weight and price surrogates for simplicity.
Trang 11Sample Extracted Data: Part Data Table
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
Trang 12Analyze Data
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
Trang 13Sample Orders and Parts View Data
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
Trang 14Creating Customer Summary Query
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
Trang 15Customer Summary
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
Trang 16Qualifying Parts Query Design
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
Trang 17Publish Results: Qualifying Parts Query Results
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
Trang 18Publish Results: Sales History for Selected Parts
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
Trang 19Ethics Guide: Unseen Cyberazzi
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
• Data broker or Data aggregator
– Acquires and purchases consumer and other data from public records, retailers, Internet cookie vendors, social media trackers, and other sources.
– Data for business intelligence to sell to companies and governments.
Trang 20Ethics Guide: Unseen Cyberazzi (cont'd)
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
• Cheap cloud processing of consumer data easier, less expensive.
• Processing happens in secret.
• Data brokers enable you to view data stored about you, but
– Difficult to learn how to request your data,
– Torturous process to file for it,
– Limited data usefulness.
Trang 21Ethics Guide: Unseen Cyberazzi (cont'd)
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
• Do you know what data is gathered about you? What is done with it?
• Have you thought about conclusions data aggregators, or their clients, could make based on your use of frequent buyer cards?
• Concerned about what federal government might do with data it gets from data aggregators?
• Where does all of this end?
• What will life be like for your children or grandchildren?
Trang 22Q3: How Do Organizations Use Data Warehouses and Data Marts to Acquire Data?
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
• Functions of a data warehouse
– Obtain data from operational, internal and external databases.
– Cleanse data.
– Organize and relate data.
– Catalog data using metadata.
Trang 23Components of a Data Warehouse
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
Trang 24Examples of Consumer Data That Can Be Purchased
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
Trang 25Possible Problems with Source Data
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
Curse of dimensionality
Trang 26Data Warehouses Versus Data Marts
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
Trang 27Q4: How Do Organizations Use Reporting Applications?
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
• Create meaningful information from disparate data sources.
• Deliver information to user on time.
Trang 31Example of Expanded Grocery Sales OLAP Report
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
Drill down
Trang 32Example of Drilling Down into Expanded Grocery Sales OLAP Report
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
Trang 33Q5: How Do Organizations Use Data Mining Applications?
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
Source disciplines
Trang 34Unsupervised Data Mining
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
• No a priori hypothesis or model.
• Findings obtained solely by data analysis.
• Hypothesized model created to explain patterns found.
• Example: Cluster analysis.
Trang 35Supervised Data Mining
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
• Uses a priori model.
• Prediction, such as regression analysis.
• Ex: CellPhoneWeekendMinutes
= (12 + (17.5*CustomerAge)+(23.7*NumberMonthsOfAccount)
= 12 + 17.5*21 + 23.7*6 = 521.7 minutes
Trang 36Market-Basket Analysis
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
• Market-basket analysis
– Identify sales patterns in large volumes of data.
– Identify what products customers tend to buy together.
– Computes probabilities of purchases.
– Identify cross-selling opportunities.
Customers who bought fins also bought a mask.
Trang 37Market-Basket Example: Dive Shop
Transactions = 400
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
Trang 38Decision Trees
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
• Unsupervised data mining technique.
• Hierarchical arrangement of criteria to predict a value or classification.
• Basic idea
– Select attributes most useful for classifying “pure groups.”
• Creates decision rules.
Trang 39Credit Score
Decision Tree
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
Trang 40Decision Rules for Accepting or Rejecting Offer to Purchase Loans
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
• If percent past due is less than 50 percent, then accept loan.
– If percent past due is greater than 50 percent and
– If CreditScore is greater than 572.6 and
– If CurrentLTV is less than 94, then accept loan.
• Otherwise, reject loan.
Trang 41So What? BI for Securities Trading?
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
• Quantitative applications using BigData and BI.
– Analyze immense amounts of data over a broad spectrum of sources.
– Build and evaluate investment strategies
• Two Sigma ( www.twosigma.com )
– Analyzes financial statements, developing news, Twitter activity, weather reports, other sources
– Develops and tests investment strategies.
Trang 43Q6: How Do Organizations Use BigData Applications?
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
• Huge volume – petabyte and larger
• Rapid velocity – generated rapidly.
• Great variety
– Structured data, free-form text, log files, graphics, audio, and video.
Trang 44MapReduce Processing Summary
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
Map Phase: Google search log
broken into thousands of pieces
Trang 46Hadoop
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
• Open-source program supported by Apache Foundation2
– Written in Java.
• Amazon.com supports Hadoop as part of EC3 cloud
• Query language entitled Pig (platform for large dataset analysis).
– Extensible.
– Automatically optimizes queries on map-reduce level.
Trang 47Q7: What Is the Role of Knowledge Management Systems?
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
• Knowledge Management (KM)
– Creating value from intellectual capital and sharing knowledge with those who need that capital.
• Preserving organizational memory
– Capturing and storing lessons learned and best practices of key employees.
• Scope of KM same as SM in hyper-social organizations.
Trang 48Benefits of Knowledge Management
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
• Improve process quality.
• Increase team strength.
• Goal:
– Enable employees to use organization’s collective knowledge.
Trang 49Encode human knowledge
Process IF side of rules
Report values of all variables
Knowledge gathered from human
experts Expert systems shells
Trang 50Example of IF/THEN Rules
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
Trang 51– Changes cause unpredictable outcomes.
– Constantly need expensive changes.
3 Don’t live up to expectations.
– Can’t duplicate diagnostic abilities of humans.
Trang 52What Are Content Management Systems (CMS)?
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
• Support management and delivery of documents, other expressions of employee knowledge.
• Challenges of Content Management
Trang 53What are CMS Application Alternatives?
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
• In-house custom development
– Customer support develops in-house database applications to track customer problems.
• Off-the-shelf
– Horizontal market products (SharePoint).
– Vertical market applications.
• Public search engine
–Google, Bing.
Trang 54How Do Hyper-Social Organizations Manage Knowledge?
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
• Hyper-social knowledge management
– Social media, and related applications, for management and delivery of organizational knowledge
resources.
• Hyper-organization theory
– Framework for understanding KM.
– Focus shifts from knowledge and content to fostering authentic relationships among knowledge creators and users.
Trang 55Hyper-Social KM
Media
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
Trang 56– Strong management endorsement
– Strong positive feedback.
– “Nothing wrong with praise or cash especially cash.”
Trang 57Q8: What Are the Alternatives for Publishing BI?
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
Trang 59Q9: 2026?
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
• Exponentially more information about customers, better data mining techniques.
• Companies buy and sell your purchasing habits and psyche.
• Singularity
– Computer systems adapt and create their own software without human assistance.
– Machines will possess and create information for themselves.
– Will we know what the machines will know?
Trang 60 Passwords and permissions.
Delivery system must be secure.
2 Unintended release of protected information through reports and documents.
3. What, if anything, can be done to prevent what Megan did?
Trang 62Active Review
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
Q1: How do organizations use business intelligence (BI) systems?
Q2: What are the three primary activities in the BI process?
Q3: How do organizations use data warehouses and data marts to acquire data?
Q4: How do organizations use reporting applications?
Q5: How do organizations use data mining applications?
Q6: How do organizations use BigData applications?
Q7: What is the role of knowledge management systems?
Q8: What are the alternatives for publishing BI?
Q9: 2026?
Trang 63Case Study 9: Hadoop the Cookie Cutter
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
• Third-party cookie created by site other than one you visited.
• Most commonly occurs when a Web page includes content from multiple sources.
• DoubleClick
– IP address where content was delivered.
– DoubleClick instructs your browser to store a DoubleClick cookie.
– Records data in cookie log on DoubleClick’s server.
Trang 64• Cookie log shows how you respond to ads and your pattern of visiting various Web sites where ads placed.
• Firefox Lightbeam tracks and graphs cookies on your computer.
Trang 65FireFox Lightbeam: Display on Start Up
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
No Cookies
Trang 66After Visiting MSN.com
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
Trang 675 Sites Visited Yields 27 Third Parties
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c
Trang 68Sites Connected to DoubleClick
C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c